Click the image below to download our white papers.

Secure the Basics First

Secure the Basics First: Top Exploitable Security Vulnerabilities

Contributors: Brian DiPaolo, Director of Strategic Services and Josh Berry, Senior Technology Manager

Microsoft’s recently released 2016 Trends in Cybersecurity reports that, through the second half of 2015, 41.8 percent of all vulnerability disclosures were rated as highly severe, which constitutes a three-year high. Accudata’s white paper shows you how to spot and remediate the most commonly-ignored significant vulnerabilities.

Use What You Have To Get What You Want:
How To Modernize Your IT Environment

Contributors: Vid Sista, Director of Technology Solutions, Brian DiPaolo, Director of Strategic Services, and Steve Jordan, Senior Technology Manager

Overall IT spend is decreasing worldwide – yet new game-changing technologies can provide businesses the advantage they need. Accudata’s white paper shows how to integrate what you currently have with the hottest tech trends – and how to build a long-term plan for IT success.

Four Productivity Applications

Four Applications to Increase Productivity

By: Kevin Nicosia, Professional Services Manager

Increasing productivity is on everyone’s to-do list, but with the wide range of productivity tools out there, how do you choose? We’ve identified four applications that can help you locate and share information, identify experts, and communicate with remote workers or customers in real time.

The Ashley Madison Hack

Liars and Cheaters:
How the Ashley Madison Hack Happened

By: Jack Wehman, Technical Writer

Ashley Madison sells no products. There are no stores to shop in. There is only a website and a database of paying customers. Their entire company is predicated on retaining and sharing data by fostering private and sensitive communications between paying customers.

Securing Scada

Securing SCADA

By: Kevin Kaufman, Principal Consultant

Industrial Control Systems (ICS) and Supervisory Control And Data Acquisition (SCADA) networks control our most critical infrastructures. Power generation and distribution, industrial manufacturing, chemical refineries, oil rigs, large communication systems – any plant that relies on automation utilizes some sort of SCADA network.

Inevitable Attack

The Inevitable Attack

By: Brian DiPaolo, Director of Strategic Services

Your network is going to be attacked. There’s no doubt. It’s not if, it’s when. You can’t stop it, and you can’t prevent it – someone, somewhere, is going to attempt to get whatever they can from you.

Exposing The Unknown: How Sandboxing Technology Fights Modern Threats

SPONSORED: Check Point

Increasingly skillful at stealing data and disrupting network operations, cyber criminals wreak havoc with numerous, large-scale data breaches. As these attacks happen more frequently, it’s only a matter of time before your company becomes a target. Some organizations will be aware of those breaches (or even prevent them) and take corrective action, but most will not even know they happened. It means your company is vulnerable.